Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/04/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
c9e0eb921a4f4f473d7cf30d103a5b28_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9e0eb921a4f4f473d7cf30d103a5b28_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
c9e0eb921a4f4f473d7cf30d103a5b28_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
c9e0eb921a4f4f473d7cf30d103a5b28
-
SHA1
7fd90c058111fed7c99b066c2d9a1e6f9d3e4693
-
SHA256
3ccc12dab568a2bc886c129cfc57c195495fd58cabafc2683695a0b00e9524da
-
SHA512
f1d7011b206acbd5db68cd44d82872d0825187fe6664b7332f0c5fe122b76f45a1ab4f186ebf0263f69e52c4fb199a1c1d1d83fddf2d24b45a1118e0ef5ab89f
-
SSDEEP
49152:Qoa1taC070djLtuFmNXec7U+u/Oyu9W1pg:Qoa1taC0gLtTl7E1kW1O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2172 9212.tmp -
Executes dropped EXE 1 IoCs
pid Process 2172 9212.tmp -
Loads dropped DLL 1 IoCs
pid Process 1300 c9e0eb921a4f4f473d7cf30d103a5b28_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2172 1300 c9e0eb921a4f4f473d7cf30d103a5b28_JaffaCakes118.exe 28 PID 1300 wrote to memory of 2172 1300 c9e0eb921a4f4f473d7cf30d103a5b28_JaffaCakes118.exe 28 PID 1300 wrote to memory of 2172 1300 c9e0eb921a4f4f473d7cf30d103a5b28_JaffaCakes118.exe 28 PID 1300 wrote to memory of 2172 1300 c9e0eb921a4f4f473d7cf30d103a5b28_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9e0eb921a4f4f473d7cf30d103a5b28_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c9e0eb921a4f4f473d7cf30d103a5b28_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\9212.tmp"C:\Users\Admin\AppData\Local\Temp\9212.tmp" --splashC:\Users\Admin\AppData\Local\Temp\c9e0eb921a4f4f473d7cf30d103a5b28_JaffaCakes118.exe AA5A728C1E307F65833034BEA52488220AE29741398E171F2CA191407BCB7780B4846A95884D892D2D3D2DBA223177AEA29486345936B768008FA60030643F262⤵
- Deletes itself
- Executes dropped EXE
PID:2172
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5f860ff3807eb4d921dfd5bacbce9a92c
SHA1ed823da5cf4eea9a99cdb0bc536ac89c2787b91c
SHA256a2c6791f4ac9cc33ebcb6acb6b01f8c19b8381ce08fde88f64839f56eef113fb
SHA5127da9db6f0ef88ce3fb29dd247b043fa0377a898a6f5b92509cac4543dcdc03e025c729998b21ce0b6b9bea07797e69c44c8d0ac661bb91bb8833d93fe5ef8884